CISSP Cyber Training - Shon Gerber
CISSP Cyber Training - Shon Gerber
  • Видео 280
  • Просмотров 8 923
CCT 180: Failing Securely, Separation of Duties, and System Resilience for the CISSP (Domain 3.5-8)
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms)
What if your organization's security posture could withstand any cyber threat? This episode of the CISSP Cyber Training Podcast promises to equip you with actionable insights from CISSP Domain 3, emphasizing the critical principle of failing securely. We tackle the intricacies of separation of duties, zero trust, and the benefits of maintaining simplicity in your systems. Plus, I share my firsthand experience with virtual CISO roles, providing a roadmap for hiring a security professional, from conducting gap assessments to understanding risk profiles and developing robust mitigation strategies.
Next, we dive deep int...
Просмотров: 25

Видео

CCT 179: Practice CISSP Questions - Data Security Controls, Labeling, and Cloud Access Security (...
Просмотров 2614 часов назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Ever wondered about the real difference between a data leak and a data breach? Join me, Sean Gerber, on the latest episode of the CISSP Cyber Training Podcast as we unpack the nuances between these two critical cybersecurity concepts. Learn how data leaks often result from human mistakes like weak passwords, while data br...
CCT 178: Data Security Controls, Labeling, and Cloud Access Security (CISSP Domain 2.6)
Просмотров 3021 час назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Ever wondered how a TI-84 calculator can be transformed into a powerful tool for ChatGPT? Join me, Sean Gerber, on this thrilling episode of the CISSP Cyber Training Podcast as we uncover this fascinating tale and explore the evolving landscape of data security. We'll dissect the crucial elements of Domain 2.6 of the CISS...
CCT 177: Practice CISSP Questions - Policies and Procedures - Candidate Screening, Employment Agr...
Просмотров 19День назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) How can we effectively bridge the cybersecurity skills gap and protect sensitive data in the cloud? In this action-packed episode of the CISSP Cyber Training Podcast, we kick things off by analyzing insights from a recent UK international cyber skills conference. We discuss the UK's innovative initiatives to enhance cyber...
CCT 176: Policies and Procedures - Candidate Screening, Employment Agreements, and Background Che...
Просмотров 5914 дней назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Are you ready to uncover the secrets behind successful candidate screening and robust employment agreements in cybersecurity? Join us on this episode of the CISSP Cyber Training Podcast, where we promise to equip you with essential techniques to vet the right candidates for sensitive security roles. From structured interv...
CCT 175: Practice CISSP Questions - API Security, Gateways, and Risk Reduction Partnerships for t...
Просмотров 3514 дней назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Can API gateways really be the ultimate shield against cyber threats? Prepare to uncover the secrets of API security as we dissect CISSP Domain 8.5 in this episode of the CISSP Cyber Training Podcast. We'll walk you through practice questions that decode the most common API vulnerabilities and why denial of service isn't ...
CCT 174: Exploring Application Programming Interfaces (APIs) and Security for the CISSP (Domain 8.5)
Просмотров 5021 день назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Want to stay ahead in the rapidly evolving world of IT? Join Sean Gerber on the CISSP Cyber Training Podcast as he discusses the essential skills you need to thrive in this dynamic field. You'll get a personal peek into Sean's consulting career and his family business ventures before diving into the nuts and bolts of Doma...
CCT 173: Practice CISSP Questions - Media Protection, Encryption, and Mobile Security for the CIS...
Просмотров 3321 день назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Unlock the secrets to safeguarding your organization's most sensitive data and enhance your cybersecurity acumen. Join us on the CISSP Cyber Training Podcast as I, Sean Gerber, break down the critical importance of managing secrets within popular collaboration tools like Slack, Jira, and Confluence. Discover practical met...
CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)
Просмотров 27Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) What if AI could be your company's best asset-and its biggest risk? Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we journey through the essentials of cybersecurity with a particular focus on media protection techniques from Domain 7.5 of the CISSP ISC² training manual. We’l...
CCT 171: Practice CISSP Questions - Assessment, Compliance, for the CISSP (Domain 6.5)
Просмотров 31Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Unlock the secrets to mastering the CISSP exam and bolster your cybersecurity prowess with Sean Gerber in this action-packed episode of the CISSP Cyber Training Podcast! Ever wondered which assessment type is crucial for ensuring ISO 27001 compliance? Discover why internal audits are the gold standard. We'll also cover th...
CCT 170: Assessment, Compliance, and Improvement Strategies for the CISSP Exam (Domain 6.5)
Просмотров 18Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Ever wondered how to ensure your organization's cybersecurity measures meet international standards? Join us for an action-packed episode as we unpack Domain 6.5 of the CISSP exam, exploring crucial assessments, tests, and audit strategies every cybersecurity professional should master. Learn the importance of choosing a ...
CCT 169: Practice CISSP Questions - Understanding Role, Rule, Mandatory, and Attribute Based Cont...
Просмотров 27Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Can quantum computing break your encryption overnight? Discover the profound impact of this emerging technology on cybersecurity as we decode the recently introduced FIPS 203, 204, and 205 standards. Join me, Sean Gerber, on this week's electrifying episode of the CISSP Cyber Training Podcast to understand how the US gove...
CCT 168: Access Controls - Understanding Role, Rule, Mandatory, and Attribute Based Controls for ...
Просмотров 39Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) What would you do if your social security number was compromised in a massive data breach affecting billions? In our latest episode of the CISSP Cyber Training Podcast, we unpack the alarming reality of a recent breach that exposed the personal records of 3 billion people. We provide critical advice on how to protect your...
CCT 167: Practice CISSP Questions - Compliance and Vulnerability Management (Domain 4.5)
Просмотров 34Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) How would a massive data breach at a major corporation like Boeing affect the global cybersecurity landscape? Join us on this episode of the CISSP Cyber Training Podcast, where we dissect this alarming 50GB ransomware attack and its profound implications on the industry. Additionally, we unpack the serious data compromise...
CCT 166: Balancing Automation and Customization in Security Operations, Vulnerability Management,...
Просмотров 33Месяц назад
Send us a text (www.buzzsprout.com/twilio/text_messages/2167626/open_sms) Ever wondered why your SOC team spends so much time on routine tasks rather than addressing critical threats? Discover the 80-20 rule in security operations and see how automating 80% of routine tasks can free up your team to focus on the complex incidents that truly matter. In our latest episode, host Sean Gerber shares ...
CCT 165: Practice CISSP Exam Questions - Mastering Process States, Execution Types, and System Ar...
Просмотров 29Месяц назад
CCT 165: Practice CISSP Exam Questions - Mastering Process States, Execution Types, and System Ar...
CCT 164: Mastering Process States, Execution Types, and System Architectures for the CISSP (Domai...
Просмотров 105Месяц назад
CCT 164: Mastering Process States, Execution Types, and System Architectures for the CISSP (Domai...
CCT 163: Practice CISSP Questions - Data Roles and Regulations, Security Responsibilities (Domain 2)
Просмотров 412 месяца назад
CCT 163: Practice CISSP Questions - Data Roles and Regulations, Security Responsibilities (Domain 2)
CCT 162: Decoding Data Roles in CISSP and Navigating NIST Guidelines for Cybersecurity Governance...
Просмотров 362 месяца назад
CCT 162: Decoding Data Roles in CISSP and Navigating NIST Guidelines for Cybersecurity Governance...
CCT 161: Practice CISSP Questions - Understanding Key Cybersecurity Legislation and Career Coachi...
Просмотров 342 месяца назад
CCT 161: Practice CISSP Questions - Understanding Key Cybersecurity Legislation and Career Coachi...
CCT 160: Contractual Law, Cybersecurity Legislation, and Computer Crimes (CISSP Domain 1)
Просмотров 232 месяца назад
CCT 160: Contractual Law, Cybersecurity Legislation, and Computer Crimes (CISSP Domain 1)
CCT 159: Practice CISSP Questions - Assess the Effectiveness of Software Security (Domain 8.3)
Просмотров 402 месяца назад
CCT 159: Practice CISSP Questions - Assess the Effectiveness of Software Security (Domain 8.3)
CCT 158: Assess the Effectiveness of Software Security (CISSP Domain 8.3)
Просмотров 322 месяца назад
CCT 158: Assess the Effectiveness of Software Security (CISSP Domain 8.3)
CCT 157: Practice CISSP Questions - AI in Cybersecurity and Digital Forensics (Domain 7)
Просмотров 442 месяца назад
CCT 157: Practice CISSP Questions - AI in Cybersecurity and Digital Forensics (Domain 7)
CCT 156: Security Configuration Management, Change and Communication Best Practices (Domain 7.3)
Просмотров 422 месяца назад
CCT 156: Security Configuration Management, Change and Communication Best Practices (Domain 7.3)
CCT 154: Security Assessments, Account Management, and Backup Verification (Domain 6.3.1-5)
Просмотров 322 месяца назад
CCT 154: Security Assessments, Account Management, and Backup Verification (Domain 6.3.1-5)
CCT 155: Practice CISSP Questions - Security Assessments, Account Management, Backup Verification...
Просмотров 542 месяца назад
CCT 155: Practice CISSP Questions - Security Assessments, Account Management, Backup Verification...
CCT 154: Security Assessments, Account Management, and Backup Verification (Domain 6.3.1-5)
Просмотров 393 месяца назад
CCT 154: Security Assessments, Account Management, and Backup Verification (Domain 6.3.1-5)
CCT 151: CISSP Practice Questions - Unraveling Multi-Layer Protocols and Data Encapsulation
Просмотров 503 месяца назад
CCT 151: CISSP Practice Questions - Unraveling Multi-Layer Protocols and Data Encapsulation
CCT 153: CISSP Practice Questions - Ransomware Attacks and Understanding IoT Trustworthiness (Dom...
Просмотров 233 месяца назад
CCT 153: CISSP Practice Questions - Ransomware Attacks and Understanding IoT Trustworthiness (Dom...